Information Systems for Business : An Experiential Approach

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

A focused delivery on information systems Featuring the model "learn-do-reflect", this invaluable book offers a focused treatment of information systems topics. Packed with engaging exercises throughout the book to enhance your learning, the book aims at looking at how information is analyzed, used for competitive advantage, stored, and more. Each chapter serves as a short, focused examination of the covered topic and includes activities to drive home the material. Also included is an online instructor's web site that provides extensive support to teach with this approach. Offers a focused look at information systems and how information is analyzed, used for competitive advantage, and stored Includes helpful exercises in each chapter that drill down the lessons learned Reflects the "learn-do-reflect" teaching model Features an instructor's web site that provides extensive support This valuable book offers a practical approach to learning the capabilities and potential of information systems.

Preface

p. xv

Introduction

The Value of Information

p. 1

Focusing Story: How Information Cost Me (A Lot of) Money

p. 2

A Day in My Technology-Free Life Blog

p. 3

Data Information Knowledge and Wisdom

p. 3

Information Literacy

p. 5

Uses of Information

p. 5

How I Use Information

p. 6

How Businesses Use Information

p. 7

Business Box Promising Information Careers

p. 7

Information and Your Career

p. 8

Introduction to Information Systems

p. 13

Focusing Story: Registering for Classes in 1981

p. 14

Identifying My Information Systems

p. 15

Why All Business Professionals Need to Be IS Managers

p. 15

Components of a System

p. 16

Overview of Systems

p. 16

Components of a Business Information System

p. 18

Foundations of Information Systems

p. 18

Stats Box Growth of Applications in Apple‚«÷s App Store

p. 22

How Information Systems Help Us Deal with Information

p. 22

Business Box How Southwest Airlines Flies High with Information Systems

p. 24

Information Systems and Change

p. 25

How Information Systems Facilitate Organizational Change

p. 25

Process Improvements

p. 25

Automation

p. 26

Control

p. 26

Information Flow

p. 26

Business Box Coopers Brewery: Using Information Systems for Quality and Sustainability

p. 27

Common Information Systems

p. 28

Evaluating Information

p. 33

Focusing Story: Biased Information in a Trusted Outlet

p. 34

How Good is This Information?

p. 35

Being a Smart Information Consumer

p. 35

Stats Box

p. 36

Business Box Resume Fraud

p. 36

My Online Life and Information Overload

p. 37

Information Overload and the Need to Evaluate Information

p. 38

Dimensions of Information Quality

p. 39

Information Quality

p. 40

Business Box Information Quality as an Ethical Issue

p. 42

Evaluating Information Sources

p. 43

Evaluating Information

p. 43

Evaluating Usefulness

p. 44

Evaluating Believability

p. 45

Gaining Strategic Value from Information

p. 51

Focusing Story: Healthcare on My Cell Phone

p. 52

Strategic Information Systems

p. 53

Strategic Planning Process

p. 54

Strategic Business Planning

p. 54

Stats Box

p. 55

Information Systems Assessment

p. 55

Information Systems Vision

p. 56

Information Systems Architecture

p. 56

Strategic Initiatives Identification

p. 57

Advantages of IS Strategic Planning Process

p. 57

Frameworks for Strategic Information Systems

p. 58

Information Systems SWOT Analysis

p. 58

SWOT Analysis of a Person?

p. 59

Porter‚«÷s Five Competitive Forces Model

p. 60

Porter‚«÷s Value Chain Analysis

p. 60

Virtual Value Chain

p. 62

Evaluating Strategic Initiatives

p. 64

Critical Success Factors

p. 64

CSFS for Implementing Web Portals in Saudi Arabia

p. 65

What Does Yahoo! Need for Success?

p. 66

Priority Matrix

p. 66

Competitive Advantage at Outrigger Hotels and Resorts

p. 67

Hyper-competition: Sustainability of Competitive Advantage

p. 67

Google Vs. Yahoo!

p. 69

Managing Information

Storing and Organizing Information

p. 75

Focusing Story: The Database Behind Facebook

p. 76

Data for an Amazon Order

p. 77

Stats Box

p. 77

Overview of Relational Databases

p. 77

Databases and Database Management Systems

p. 77

Connecting Data Elements

p. 78

Databases vs. Spreadsheets (When to Use a DBMS)

p. 78

Relational Databases

p. 79

Database Diagrams

p. 83

Finding Business Databases Online

p. 84

The Compact Disc Database (CDDB)

p. 84

Online Databases

p. 85

Analyzing Information for Business Decision-Making

p. 91

Focusing Story: How a Spreadsheet Saved Me (A Lot of) Money

p. 92

Information and Decision-Making

p. 93

Importance of Good Decision-Making Skills

p. 93

What Kind of Information Do I Need?

p. 94

Using Information for Decision-Making

p. 94

Business Box Why Do Managers Make Bad Decisions?

p. 95

Types of Decisions

p. 95

A Decision-Making Process

p. 97

Identify and Clearly Define the Problem

p. 97

Determine Requirements and Goals

p. 98

Identify Alternatives

p. 99

Define the Criteria

p. 99

Requirements Goals and Criteria

p. 99

Select a Decision-Making Technique/tool

p. 100

Evaluate the Alternatives Using the Criteria

p. 101

Check That the Solution Solves the Problem

p. 102

Information Retrieval and Analysis Tools

p. 102

"What If " I Get a 75% on the Final?

p. 103

Stats Box The Cost of Spreadsheet Errors

p. 106

What- If? Analysis in Business

p. 107

Transmitting Information

p. 113

Focusing Story: I Want My Own WiFi!: The Emergence of the MiFi

p. 114

Introduction and Definitions

p. 115

Online Document Sharing

p. 116

Network Components and Characteristics

p. 116

Types of Networks

p. 117

Wired vs. Wireless Networks

p. 117

Broadband Networks

p. 118

Broadband Penetration in the G7 Countries

p. 119

Network Coverage

p. 120

The Internet

p. 121

Internet Applications

p. 122

Stats Box

p. 123

Internet Application of the Day: Get a Degree Online!

p. 124

Internet vs. Intranet

p. 125

Virtual Private Network (VPN)

p. 125

A Future Internet? Internet2 and Business

p. 125

Networking Architectures

p. 126

Architectural Principles

p. 126

Client/Server Architecture

p. 126

Peer-to-Peer Architecture

p. 128

Wireless Architecture

p. 128

Service Oriented Architecture (SOA)

p. 128

Software as a Service (SaaS)

p. 129

Cloud Computing

p. 130

Virtualization

p. 130

Architecture and Principles

p. 130

Communicating Information in Modern Organizations

p. 131

Web 2.0

p. 132

Unified Communications (UC)

p. 132

The Power of Wikinomics

p. 134

Stats Box

p. 135

Web 2.0 for Business

p. 136

Web 3.0

p. 136

Securing Information

p. 143

Focusing Story: My Mac is More Secured than Your Windows-based PC!

p. 144

Introduction and Definitions

p. 146

Information Security Concepts

p. 146

Security Levels

p. 146

How Protected is Your Computer?

p. 147

Information Security Threats

p. 148

Denial of Service

p. 148

Unauthorized Access

p. 150

Stats Box

p. 151

Even Big Technology Companies Can be Hacked

p. 153

Detecting Phishing

p. 154

Theft and Fraud

p. 154

Summary of Security Threats

p. 155

Security Technologies and Solutions

p. 157

Security Goals

p. 157

Preventive Corrective and Detective Controls

p. 157

Physical Security vs. Logical Security

p. 158

User Profiles

p. 158

How Strong is Your Password?

p. 159

Biometrics

p. 160

Firewalls

p. 162

Rendering Data Unreadable: Encryption

p. 166

Breaking the Encryption

p. 166

Types of Cryptography

p. 166

Virus Protection

p. 169

Wireless Security

p. 169

Stats Box

p. 170

Security Policies

p. 170

Business Box 2 How to Respond to a Security Crisis

p. 170

Security Policies Compliance

p. 171

Where‚«÷s the Security?

p. 172

Risk Management

p. 172

Protecting the Confidentiality and Privacy of Information

p. 181

Focusing Story: The Reselling of Customer Data: The Choicepoint Story

p. 182

Finding Mindy‚«÷

p. 183

Information Privacy Threats

p. 185

Data Collection

p. 186

Secondary Use of Information

p. 187

Privacy Pizza

p. 187

Concern for Information Privacy

p. 188

Consequences of Privacy Violations

p. 188

Individual Consequences: Identify Theft

p. 188

Fraud Type from Identity Theft

p. 189

Organizational Consequences: Company Reputation

p. 190

Reputation Risks of Social Networking

p. 191

Technologies and Solutions for Information Privacy

p. 191

Surveillance Societies Around the World

p. 192

Cookies and Cookie Managers

p. 192

Privacy Policy Creation

p. 194

Privacy Statement or Policy

p. 194

Privacy and Facebook

p. 196

Privacy Seals

p. 197

Activity 9.4 Why Your Advisor can‚«÷t Talk to Your Parents

p. 197

Government Information Privacy Regulations

p. 198

Hippa and Identity Theft

p. 199

Privacy and Ethics

p. 199

Papa Privacy Policies and FERPA

p. 200

Relationship between Security and Privacy

p. 201

Using Information

Developing Information Systems

p. 207

Focusing Story: The $6 Billion Software Bug

p. 208

Time Cost and Quality

p. 209

Determining Requirements

p. 210

Software Development Methodologies

p. 210

Traditional Systems Development Life Cycle

p. 211

Planning Phase

p. 212

Requirements Phase

p. 212

Design Phase

p. 213

Development Phase

p. 214

Implementation Phase

p. 214

Maintenance Phase

p. 215

Advantages and Disadvantages of the SDLC

p. 215

Stats Box Standish Chaos Report

p. 216

Alternative Methodologies

p. 216

Prototyping

p. 216

Rapid Application Development (RAD)

p. 217

Spiral Model

p. 218

Comparing the Methods

p. 220

Build or Buy Decision

p. 220

How Open Source Software Impacts Build vs. Buy

p. 223

Using Open Source in Business

p. 223

Business Box Bad Economy Leads to More Open Source Software

p. 225

What to Outsource

p. 225

Outsourcing Information Systems

p. 226

Outsourcing Models

p. 226

Benefits and Risks of Outsourcing

p. 227

Making the Outsourcing Decision

p. 227

Business Box Reversing the Outsourcing Decision

p. 228

Geographic Considerations

p. 229

Information-Based Business Process

p. 235

Focusing Story: Improving Processes is For Everyone!

p. 236

How Many Steps in this Process?

p. 237

What Is a Process?

p. 237

Process Modeling

p. 239

Model This!

p. 240

Business Process Modeling Tools

p. 240

Technology and Processes

p. 242

Process Improvement

p. 243

Levels of Change

p. 245

Importance of Process Redesign

p. 245

Redesign This!

p. 246

Choicecare Physicians: Changing Access to Patient Records

p. 247

Enterprise Information Systems

p. 251

Focusing Story: Supply Chain Innovations at Wal-Mart

p. 252

Finding The Components of an Enterprise System

p. 254

Enterprise Systems

p. 254

Personal vs. Enterprise Systems

p. 254

Integration and Enterprise Systems

p. 256

Characteristics of Enterprise Systems

p. 256

Enterprise Resource Planning (ERP)

p. 258

Benefits and Disadvantages of ERP Systems

p. 259

The Power of ERP Data: How Slumberland Furniture Cleaned up its Supplier List

p. 259

ERP is not Always a Horror Story: Cisco Implementation on Time and Budget